Friday, June 7, 2019
Media Coursework Report Essay Example for Free
Media Coursework Report EssayFor my AS Media coursework, I chose to use carriage as the genre of my magazine. To help with my pre-production, I had to perform my own qualitative and vicenary research into expression magazines and find let on what my localize audience of 15-19 year old girls would want from it. I went on to piss the preliminary products which included the introductory bulk large and contents page, and from these the main products which were the alternative scarecrow make up and double page spread. These were all produced using Photoshop.I began by creating a questionnaire, as this is an strong way of finding out what my target audience will be looking for in a fashion magazine. I included 8 questions which asked slightly general questions into what the participant is interested in, and some into what they would like to see in a fashion magazine, to help me create my front extend and contents page. I gave 20 questionnaires out to other students aged 16-19 as this harmonises my target audience.By analysing the results of the questionnaire, I found out a range of information to help my soma my front cover. The participants chose 2.50 as the appropriate price and for the magazine to be produced monthly, which I will apply when creating the front cover. 80% of participants said they would be more than in all probability to pick up the magazine if thither was a celebrity on the cover. Therefore, I will ask a friend to pose as a celebrity to rag it more appealing to my target audience. 50% of participants wanted to see interviews in the magazine and 30% wanted genre-specific features (in this case, it will be fashion, wearing apparel etc.) which I will give certain(p) to include in the contents page.I formed a focus group with other AS Media students in my class. They were all pistillates, ranged from the ages 16-17, and had an interest in fashion, making them representative of my target audience. I asked them if I should put just one image on the front cover, or add small-scaleer ones around the page to show whats included inside. The feedback I received was very helpful, and led me to use just the one main photo for my preliminary front cover andmy main front cover, to keep the brand ordered. This keeps it looking professional and stops the page from looking overcrowded and trashy.By textually analysing fashion magazines currently on the market, I discovered a recurring theme among them. The bigger magazines (Vogue, Elle) have been around for much longer, and their cover stars overlap the masthead. However, when analysing Look, I sight that the masthead overlapped the cover star, suggesting that this magazine is new and lesser known. From this, I distinguishable to have the whole masthead of my magazine visible by audiences for my preliminary front cover as it is new and allows audiences to recognise the brand in future. I then chose to overlap part of the masthead on my main front cover with the c over star, as it is a later issue and audiences should then be able to recognise it.The content analysis allowed me to see whats included in fashion magazines. This helped when compiling the contents page. Obviously the main part of a fashion magazine is the fashion itself. However, it also includes items related to hair and beauty, interviews, articles, advice and special features. I made sure to include all of these when designing my contents page, but I chose to keep the main focus on fashion.I opinionated to target my magazine towards teenage girls aged between 15 and 19. I thought this was a peachy range, as girls in their teens will have a more developed sense of style. From my institutional research, I discovered that many fashion magazines were targeted towards women in their 20s and 30s, and decided to aim mine at a teenage audience. Audiences for fashion magazines such as Vogue and Elle were predominantly female therefore it was important to include items in the contents and on the cover that would attract a female audience. I also tried to use feminine colours where appropriate in the magazine to indicate the target audience. I also made sure my focus group was a good representation of my target audience, thus making sure they had a clear interest in fashion and fit the age category, which they did.I created my preliminary and main products using Adobe Photoshop which had all the necessary tools I needed to create a realistic and professionalmagazine. By comparing my magazine in relation to Vogue, I am able to see the strengths and weaknesses of my production. I began by selecting the images I would use for each page. I utilise a Fujifilm Finepix S2950 to capture the photos. The nonpluss used direct mode of address as this is the most entrapive way of attracting the audience. I used a hairdryer to create the effect of wind blowing the models hair. I chose to use an image with a light background, with a model wearing spring c dowryhing.I think t his helped to make the cover look more professional as Vogue often incorporates the colours of the magazine to fit the season. I increased the contrast of the image to make it look brighter and more appealing. I then went on to create puffs around the image, and used only Century Gothic baptistry to keep it simple and sophisticated. I used a dark blue for the text as it contrasted substantially with the pink clothing that the model wore. I made sure to include small details as well, including the bar code, price and date to make the product more realistic. I was very pleased with the outcome of my preliminary front cover as it looked professional in relation to magazines on the market today, and had a similar style to that of Vogue magazine.My next task was the contents page, and from the research I did I was able to see what needed to be included. I wanted to keep it consistent, and so I used the same masthead from the front cover and used it at the top of the contents page. This was used in InStyles contents page. I also used the same colour scheme as the front cover, to show that the two are related. I kept the text in columns and split the content into sections, which is what I noticed InStyle and Vogue did when I researched them.I also noticed in the Vogue contents page that there was some information about the front cover image, so I decided to include that in my own, with information on where to buy the clothes. I was quite pleased with the result of my contents page, as I spent a lot of time on it. However, I felt that there was too much white space that could have been filled in. It may have been a good idea to add in some borders to give the page some depth.For the alternative cover, I made sure I kept the same font style and size for my masthead. This is because it is important to keep the brand recognisable. I asked my focus group if this was a good idea and theyagreed, saying it would keep it consistent and professional. every last(predicate) m agazines do this, but fashion magazines such as Vogue and Elle often change the colour every month to fit with the theme. I have decided to do the same in my own production, by changing the colour of the masthead and the puffs to a maroon colour, to tie in with the month and season. It also contrasted well with the cover models blue dress. Like Vogue, I made sure I kept three puffs around the edges of the main image, to stop them from overlapping. I am really pleased with the outcome of this as I think it could pass as a real magazine.I then went on to create the double page spread in A3 size, and selected my image to cover the whole background. This meant there was no white space left around the edges, but there was still space to put some text. I wanted the image to take up dominant space on the page to catch the subscribers eye, which is what I noticed was used in Vogues double page spread.I brightened the image and removed some blemishes on the model to try and reach a flawless image, as perfection is one of the main selling points for a fashion magazine. I set the text out in two columns, as this is the layout that most magazines use, including Vogue. I used Rage Italic for the headline, which is what I used for the headline on the cover, to keep a consistent house style. I also added page numbers to the bottom corners, as these small details help to build up a realistic product.I feel that my magazine is very similar to a professional product and would stand out in the market place. It follows the codes and conventions of a typical fashion magazine, and is aesthetically pleasing for the target audience. If I were to change anything, I would make the front cover masthead slightly larger, to make it more eye-catching.
Thursday, June 6, 2019
Reflection of the Role and Responsibilities of the Teacher Essay Example for Free
Reflection of the Role and Responsibilities of the T individuallyer EssayRoles and Responsibilities of a teacher are vital and must be learnt, as a general rule, to ensure quality of teaching. To embark on this journey it is essential to attain enough knowledge about the subject and benefit the correct material for teaching. It is not just sufficient to hold computable quality knowledge on the subject, but also have a respectable appearance. The teacher is responsible for savant behaviour and classroom management, as well as to understand the capability of the disciples. Therefore it is essential for teachers to assess the students level of understanding.As all students learn in different ways, there is the H iodiney and Mumford theory breeding styles (Honey, P. Mumford, A. 1992), to assist teachers. By carrying out group work it will endure a good chance to get students working together as it facilitates the need for productive talk, (Edwards Mercer, 1987). Here the sociological learning style can be applied. By implementing this on the students it allows them to learn from each other and share ideas with one another. The students can also participate in exploratory talk (Mercer Hodgkinson 2008) which allows them to teach each other and take ownership of their own ideas.This is very encouraging as it allows the students to indulge deeply on the knowledge they hold, when explaining to other individuals. Also with the help of the profits and modern technology there are many ways to get the students interactively involved with lessons. To allow them to work on their own, will be a better way of learning as they will be learning on their own terms. Here one other learning style has been applied, which is the tactile style, this is where the student learns best when they are given the opportunity by doing something by themselves.On the other hand there is the auditory learning style whereby a apprentice benefits from simply listening, so if the lectures are well planned and class discussions are carried out it will benefit this type of learner. If the above was applied to the students they would stay move and involved with the teacher, which is alpha for effective learning. Also possessing a great amount of creativity when teaching and trying new ways of explaining areas of the subject will mystify great outcomes to the students level of learning. As Wilson (2008), states on similar terms that the oles are functions of a teacher, which are, planning and preparing for the class, developing interesting way to deliver the lesson, assessing the impact of learning and ensuring safe learning. Therefore ensuring suitable accommodation facilities, which are available, in order to provide the desired learning setting. If the roles and responsibilities of a teacher are in good practice the teacher will be in a position where she/he can be approached with comfort and ease by the student, not only to discuss about the subject but a nything they wish to discuss.Again this brings great benefit allowing the teacher to understand the learner and to provide the correct resources. Moreover the safeguarding of children is taken very seriously and usually new teachers are supplied with key documents, which are required to be read and understood and complied with, for example if a teacher knows a child is being abused the teacher will have to know how to deal with the situation using the advice given and who to report it to.One other important part of being a teacher is knowing how well he/she is teaching, this can be striked by assessing the students, and from these assessments changes for improvement can take place. When assessing through assignments or exams, it is highly important teachers provide positive feedback as it will always encourage the student to learn more. On concluding this, teaching should be delivered to the learner in a way that is informative, creative, interactive and responsive within a relaxe d environment, to enable high learning performance from the learners.The teachers holds many roles and responsibilities, however, most importantly there are in search of constant ways of finding better ways of students to learn, by using different unique methods to allow the learner to achieve their best outcome, which will then make them accessible for contributing positively in society, or going onto higher education, and providing a better lifestyle for one self.
Wednesday, June 5, 2019
Security And Confidentiality On The Internet Information Technology Essay
Security And Confidentiality On The profits Information Technology EssayOn 9th of November 2009 The earnings t from each oneer requested 3000 word report related to the FETAC ne devilrk module. This report was to be submitted by 14th of January2010. The topic of the report is Security and Confidentiality on the Internet with reference to cookies, computer vir handlings, encryption, digital signatures, firewalls, filtering softw atomic number 18 and personal c at a timealing.Recommendations were requested.2. Method of ProcedureI found most of the instruction on the internet. In order to obtain the pertinent randomness, I utilize Google Search Engine with makewords in English Internet Security, Privacy on the Internet, Malwargon, Computer computer viruses, Cookies, Firewalls, Filtering Softwargon, Encryption, Digital Signatures, Computer Protection, Threats on the Internet.Keywords in Lithuanian Privatumas Internete, Saugumas Intenete, Kompiuteriniai Virusai, Ugniasien-s, Fil travimo Prgramin- ranga, ifravimas, Skaitmeninis Paraas, Pavojai Internete.Also, some printed sources of development such(prenominal) as books and a periodical press in English and Lithaunian were adopted.Several pages for each topic were checked to actualise that the information was correct and fully understud. That hepled me to make conclusions and to give recommendations.3. Findings3.1 Importance of SubjectWith the progress of affordable technology more(prenominal) than of us store more and more of our life in bits and bytes. By the end of 2009 there was more than 1,5 billion Internet users in 260 countries on e really continent. The Internet is not a angiotensin transforming enzyme vane, but a vast array of connected net plant life situated all over the world, easily accessible by personal electronic computers, notebooks, netbooks, smartph atomic number 53s, PDAs, game consoles, advanced TVs, homogeneous photo cameras or even kitchen appliances as hi-tech fridges and mic rowaves in a variety of ways.Today, the Internet uses gateways, routers, broadband connections, Wi-Fi separates and Internet service providers (ISPs) to make itself functional at all times. Individuals and organizations worldwide toilette reach close any point on the network without regard to national or geographic boundaries or time of day, there is some exceptions regarding to Internet censoring.Nowadays, it become hard to find the business without any connection to the Internet, because of its excellent source of marketing, convenience, high speed, low cost, and almost unlimited possibilities. Institutions of education, hospitals, banks, institutions of public service, providers of mobile service and internet, utility companies and of course our government has our personal information on their computers and they ar connected to the Internet.With the birth of Social Networking Sites such as Bebo, Facebook, MySace, Twitter ect., we sharing our pictures, personal details, our thoughts and lives with friends and if we are not careful with everybody on the Internet. Just Facebook on its take has more than 400 million users.even more, with new generation of Internet- Cloud Computing, individuals and business users are storing less info on their hard drives and more in the cloud- remote servers, operated by giants like Google and Amazon.However, epoch using the Internet, along with the convenience and speed of access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or utilise and that the computer brasss will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a commit cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They raft steal or tamper with information without touching a piece of paper or a photocopier . They so-and-so create new electronic files, menstruate their own programs, and even hide all evidence of their unauthorized activity.So if we are closing and locking the door in our house to prevent criminals sack up access to our valuables, we must draw off care of our house and life in the digital world and use all possible security and privacy on the Internet measures against the threats.WORLD INTERNET USAGE AND POPULATION STATISTICSWorld RegionsPopulation( 2009 Est.)Internet UsersDec.31,2000Internet UsersLatest DataPenetration(%Population)Growth2000-2009Users %of TableAfrica991,002,3424,514,40067,371,7006.8 %1,392.4%3.9 %Asia3,808,070,503114,304,000738,257,23019.4 %545.9 %42.6 %atomic number 63803,850,858105,096,093418,029,79652.0 %297.8 %24.1 %Middle East202,687,0053,284,80057,425,04628.3 %1,648.2%3.3 %North America340,831,831108,096,800252,908,00074.2 %134.0 %14.6 %Latin America/Caribbean586,662,46818,068,919179,031,47930.5 %890.8 %10.3 %Oceania / Australia34,700,2017,62 0,48020,970,49060.4 %175.2 %1.2 %WORLD TOTAL6,767,805,208360,985,4921,733,993,74125.6 %380.3 %100.0 %Copyright 2001 2009, Miniwatts Marketing Group3.2 Personal PrivacyTotal privacy does not exist on the Internet, but it is possible to minimize the risks. Most security breaches are not done by technology, but by loving engineering. In security, people is the most risky factor of all, yet its the one thing thats often forgotten. A company may setup firewalls, security software system, locks and reproduce s sack upners, but if they forget to establish and enforce a well designed security policy, they buzz off forgotten the most important part.The easiest way to get a password from someone is just to ask In more likely situations, an attacker may simply call random people and pretend they are a tech support person trying to fix a problem, and ask for confidential information as part of the diagnostic.PretextingPretexting is the way of stealing information by providing just a littl e bit of known information, and pretending to be someone youre not. Thats how identity thieves raise call banks and, after a hardly a(prenominal) tries, by simply providing basic information about the target, get all the data they want.PhishingPhishing is when you receive an email that looks like its from your bank, Paypal, online shop or another determine site you use, and asking you to login to confirm your information.It works in this way the criminals sets up a website which looks like the genuine one and then ships phishing email to thousands of people, until they find somebody. accordingly when the person tries to login, his login information is intercepted by the bad guys and used to steal valuable information.MalwareMalicious programs, especially Key loggers can record what keys on the keyboard you are pressure when login to secure websites, to obtain your user spend a penny and password. Often Key loggers are incorporated together with Trojan Viruses, programs which p retends to be useful software i.e. antivirus or computer maintenance programs, to send stolen information to the criminals.Privacy threats on Social Networking SitesInternet users pay back to be very careful with the hidden information that they share on the web. Internet is congruous very popular way to communicate with people. Most people who give too much of private information about themselves arent aware about the risks they taking. in that location are people who can pretend to be your friends, gain information and use this information against you for blackmailing, psychological terror or for access to secure private pages.Conclusions and RecommendationsThe offenders are eer inventing new methods to steal private information. We have to be aware about that, constantly refresh our knowledge about security and living scam schemes and take all possible security measures by using trusted up to date security software. Never click a connexion in an email from unknown sender, never download from an untrusted source, and always type in the address of your financial sites to access them. Need to avoid to disclose responsive information online especially to the people we dont know very well.Also we have to remember that these attacks as well as can be done offline. Most identity thefts are done by people simply going through rubbish bins and getting confidential data that was thrown out, like a bank statements, invoices, payslips ect. We incline do much to secure our personal data collected and stored by businesses and institutions which can also be stolen or misused, just hope that they will take same good care as we do.3.3 CookiesWhat are Cookies?Cookies are a piece of text that a web server sends to web browser and are stored on a users hard disk. Main purpose of cookies is to help prepare customized web pages with our settings, interests, browsing habits. It works in similar way to loyalty cards i.e. if we bought a book in Amazon internet shop, next time when we come back to Amazon first it will offer similar books to our purchase.Cookies do not act venomedly on computer systems. They are text files that can be deleted at any time. Cookies cant be used to open viruses. But because any personal information that we gave to a web site will be stored in a cookie some people can accept it as a threat to privacy and anonymity. To prevent misuse of information in the cookie if its stolen, information in the cookie is encrypted.How do They contribute?When we visit a site that uses cookies, it can ask the browser to place one or more cookies on the visitors hard drive. It will contain our name and password, fill in form i.e. delivery addresses and basically what we do in the page. Next time, when we come back to the site the web browser sends back the cookies that break down to the site and then we will see personalized Web page with our details. Generally cookies help us to save a little bit of time. And we always have possibility to switch it off, however internet shopping web pages requires cookies to accesses them.How Could I Prevent/Manage Cookies?If we want to delete cookies we have to follow these moveInternet Explorer Tools /Internet options/Security /Set security level to high or custom level/Cookies/Disable.Mozilla Firefox Tools/Options/Privacy/Cookies/Uncheck/Allow sites to set cookies opposite options are to use designated Cookie Managing software or to use advanced Antivirus programs which also have the option to control cookies, to block cookies that we dont want and save yet the cookies that we want.Conclusions and RecommendationsI think that cookies are useful because we can get personalized information to read, do not spend time on security questions where it is undeniable to enter a password, we dont have to spend time filling up same forms. Cookies do not collect information saved in the computer, it can contain only private data that we give to a website on our own free will. And if we dont want some cookies we are able to remove them from computer when we want. Some websites such as internet banking, e-shops and similar are impossible to use properly without allowing the cookies.3.4 VirusesWhat is a Virus?Computer viruses are small catty program codes, which are designed by using various techniques to hide themselves inside the executable files. Their aim is to replicate, spread between the computers using removable media or network and to interfere with computer operation slowing down computer, damaging or deleting data, disturbing users and wasting time by showing annoying massages.Virus can be classified by several characteristic wager on the origin, on the way how they infect computer, on the place where they hide, on the constipation that they can cause However, the computer virus is only one type of the malicious software or malware, but majority of computer users referring to all malicious programs (Trojan horses, worms, rootkits, spyware etc.) as the v iruses.Type of VirusDifferent viruses can have many common characteristics and constantly appearing viruses with new specifications or combinations.Resident Virus. Loads the homecoming module into RAM memory when is executed, after this virus can infect all files that are accessed by user or operating system. If the antivirus program fails to spot the virus in the RAM it can infect all scanned files.FAT Virus. The File Allocation Table is a fundamental element in the system it works like an index, keeping information where is the files stores on the hard disk drive (HDD), which sectors are empty etc. If this vital index is destroyed by virus, it makes impossible for computer to locate files. It also can overwrite the files or entire directories corrupting them permanently. sometimes the only solution to fix the computer bear on by FAT virus is to format hard disk drive. Huge downside of this is that all information on HDD will be permanently erased.Virus of Direct-Action. Sometime s referred as Non-Resident Virus, they are unlike to resident virus, not loading in to RAM memory. They try to infect the programs and cause damage at the moment of work of septic file. Most of viruses are Resident.Overwriting Virus. Most destructible type of virus, it overwrites the information in the infected files corrupting them permanently. If you dont have the back-up copy of your files its a bad password because the only way to get rid of this type of virus is to delete infected files.Boot Virus. Also known as System Virus. These viruses infect tiny section with boot code on hard disk or another bootable media storage that helps to start computer. When the computer starts up and the boot virus is launched, it can take complete control over infected computer and does everything it wants (steal private information, delete system files etc.) Clean bootable antivirus software required to disinfect the system. However depend on the virus this solution is not enough to clean boo table sector.Macro Virus. Macros are micro-programs associated with a file that serve to automate joint complexes of operation. Macro virus expand from applications which use macro, word document (file with extension .doc),Excel (file with extension .xls) data of Access (file with extension .mdb), Power point (file with extension .pps). When we open a file containing a virus of this type of macros are automatically loaded causing the infection. Most applications that use macros have, but many macro viruses easily circumvent this protection. many-sided Virus.Very advanced type of virus that can perform multiple infections combining different techniques. These viruses are considered very dangerous, for its ability to combine many techniques of infection and offensive effects of their actions.File Virus. Infect programs or executable files (files with extension .ex and .com) when run the infected program, the virus becomes active, producing different effects. The majority of exiting v iruses are of this type.Logic Bombs.Neither virus is considered strictly as they do not reproduce. They are not separate programs, but hides in an unmarked segment within another program.They aim to destroy the data on a computer or cause other significant damage on it when certain conditions are met. While this does not happen, no one notices the presence of the logic bomb. Its action can be extremely destructive.Trojan Virus.Trojan arent considered virus, because they dont replicate themselves. Trojans are commonly hidden in the programs that appliers to be useful, but instead opens unauthorized access to users computer. Trojans also can be installed thorough web pages with executable content (ActiveX control), email attachements.The effects of the Trojan can be very dangerous, allowing remote control from other computer (downloading, uploading, modifying or deleting files), installing key loggers and other malware, connecting computer to botnet (sending SPAM messages, perform n etwork DDos attacks).How can computers become infected and what damage can cause?Viruses can infect computers throughInternet (email attachments, infected web pages, downloading infected files)Computer networksRemovable Media DrivesVirus SymptomsThe computer runs very slowReduces the available memoryThe computer shuts down or freeze frequentlyThere are programs which do not work or goThere is less free space on your hard diskComputer files disappearStrange messages appear on the screen.Some file are renamed or extendedConclusions and RecommendationsNot everything that affects the normal functioning of a computer is a virus. Is very important to have means to detect and disinfect viruses use an antivirus program and update daily (use default settings). Scan all removable disks before use it and scan computer periodically at least once a week.3.5 FirewallA firewall is a system that protects a computer or computer networks block unauthorized network access while permitting authorized communications. Firewall can be implemented in software, hardware or combination of both. Firewall is placed between protected and unprotected networks and acts as a gate to protect network or single computer, by inspecting network traffic, applying rules and allowing or denying connection.Firewall can use different techniques to do soPacket filter (inspects every information software package passing through the network)Application gateway (applies rules to specific applications such as FTP, Telnet servers.)Circuit-level gateway(applies rules to TCP or UDP connections, when are made there is no further inspection.) substitute Server (checks all network activity passing through network.)Conclusions and RecommendationsEveryone should use a firewall against network intruders to protect computer and private information. Most of the antivirus programs and operating systems have integrated firewall software. Minor disadvantage of firewall, it can slow down Internet traffic and can be tr icky for not advanced users to set-up it properly (not blocking traffic for useful programs).3.6 Filtering SoftwareThe filtering software is designed to control what contents are allowed to be accessed on Internet. Often its installed on the computers of educational, government organizations, private companies. Filtering software is commonly used by parents to prevent their children from having access to certain web places unsuitable for minors. It also can be used as the mean of censorship in some countries.How does it work?Nowadays on the market there are many options of filtering software with various techniques and content filtering to prevent from harmful online material.The filtering programs works like thatAddress blocking websites containing such contentControlling access timesAccepting default address listPossible to establish your own list of addressesAssigning different profiles or different days and times(work, leisure, etc.)Controlling which services can be used at any time and for each user (mail, chat, etc.)Advantages and disadvantages of Filtering Software.Advantage of filtering software is that does not allow minor to access pages of violence, pornography, racism. In a work place it prevents employees of wasting their time and resources for personal proposes (chatting online, mixer network pages, etc.).Main disadvantage is over-zealous filtering. Par example, in some filters attempts to block the word sex would block words such as Essex and Sussex and etc.Internet censorship in some countries limits freedom of speech for different reasons and that is not a good thing.Some Filtering Software examples.Netnanny, Mobicop, DansGuard, CleanFeed,Web Sence3.7 EncryptionIts a method to convert the characters of a text that can not be understood unless it is read with the corresponding key. Used to protect the integrity of cloak-and-dagger information if it is intercepted. Encryption is also used when data is sent via secure intranet (VSPN). Encryptio n is used for electronic commerce to protect credit card information.How does it work?The keys are the heart of the encryption. The keys are complex mathematical formulas (algorithms) used to encrypt and decrypt information. If someone encrypts a message, only one with the appropriate key can decrypt the message. Algorithms are used to perform a hash function. This process produces a unique MD5 for this message. The MD5 is encrypted with the senders private key resulting in a fingerprint.Conclusions and RecommendationsEveryone who has and important or secret information (banks, hospitals, government, universities, e-commerce sites) they have to keep this information in secret from fraudsters.In recent years, it was few cases when portable computers of government organizations with secret information were lost or stolen. Laptops (portable computers) became more and more popular and most of us have some kind of personal information on our computers. So it is very important to have tha t information encrypted, in case of losing it.3.8 Digital SignaturesA set of data in electronic form attached to or associated with others which are used to identify the signatory, which allows you to check the provenance, genuineness and integrity of messages exchanged over the Internet.There are two types of electronic signatures basic and advanced. The basic does not guarantee the identity of the signer, neither the veracity of information received since the sending does not ensure that the issuer has made it known to us, while the advanced signature identifies the signer and detect any subsequent change of data that could occur.The digital signature is a specific techology signature and created by the so-called System Asymmetric key cryptography and it works like that The holder has two keys public key and private key ,private key is only known to the issuer and is associated to the information you send .while the person who received only know their public key .Two keys are ne eded and complement each other to get the encrypted message appears as the original .When we want sent private information the information is encrypted by system which use mathematical operations so the information becames encripted ( strange numbers and letters) so the message only can be decode by the people who know the instruction and have a public keyConclusions and RecommendationsIt should be used by the organitations which have an important or secret information as banks, universities, hospitals, etc., these organitations should use digital signatures in order to avoid the risk of fraud .they have to be sure about the authenticy of the sender.
Tuesday, June 4, 2019
The effects of technology on society
The effects of engineering science on societyThe effects of technology on societyThe term technology is derived from the Greek word technologia which means the practical exertion of knowledge, particularly in a specific discipline of study. It is worthy to note that technology is an abstract term that lacks a single universally acceptable concrete definition. Nevertheless, it crowd out be defined as the usage and application of knowledge concerning tools, crafts, techniques, methods or systems of organization, or a material end product of these things, such as clothing. It is a word that is utilize collectively to portray or describe the advancements, undertakings, creations, abilities, views and knowledge of a distinct group of spate (Basalla 14-15).On the other hand, a human society can be defined as a group of community who are delineated by their cultural identity, functional interdependence and social solidarity. A comprehensive definition of this term as well takes into account the social status and roles of the plurality within society. By extension, a society may be taken to mean a group of people within a given region or country, or even the whole world in totality. As such, the meaning of society is closely linked to what is deemed to be social. It is also worth to note that members of any given society share some common characteristics, such as a common finis and a common interest or mutual concern (Jenkins 18-20). Throughout history, technologies make water significantly affected human beings and other species of animals in their ability to mesh and acclimatize to their natural environment. Historically, human beings started applying the use of technology with the improvisation of the quick natural resources into simple tools and equipment. For instance, the realization of the capacity to control fire augmented the existing sources of food, composition the invention of the wheel helped human beings to control their environment and en hance transport. On the other hand, modern proficient advancements such as the holler, the printing take and the internet check minimized physical hurdles of communication. They have also enabled human beings to interact rapidly and freely on a world(prenominal) home base by transforming the world into a global village. Nevertheless, it is quite clear that not all technologies have been used by human beings for peaceful purposes. For instance, technology has been used to construct destructive weapons that range from clubs to nuclear weapons (Basalla 20-25).Human beings are divided in their opinions about the general impact of technology on society. Some people believe that technology has really helped human societies while others disagree with this claim. Nevertheless, technology has influenced different societies both positively and negatively in various ways. For instance, technology has helped many societies, especially in the contemporary world to improve their economies as well as allowing for the creation of a leisure class. In addition, technological processes have a great deal led to pollution of the environment and exhaustion of natural resources, thus harming the earth and its environment. Different modes of technological implementation also influence the values of different societies and in many cases, arrival of new technologies often raise new ethical questions. For instance, technological advancements have led to an increase in the idea of efficiency with view to human work, a term which was in the past only applied to machines, and the challenge of conventional customs. This paper looks at how the use of machines has impacted on the capacity of workers, the effects of computer and the cell phone on society, and the general impacts of technology to the environment. In the contemporary world, machines continue to automate most of the critical industrial and kin processes. For instance, machines have taken up, and are continuing to subst itute human workers in most of the mundane jobs in industries. This is because of the evolvement of technology such that machines can even work out tasks which cannot be done by man. The application of advanced technologies, like artificial intelligence and robotics has proved to be more effective in performing grievous tasks such as space exploration and mining. Nevertheless, there is an increasing concern in many countries about the deteriorating position of the semi-skilled and unskilled workers due to improved technology. It is argued that technological advancements have made many of these menial jobs obsolete or poorly paid. This situation has been mainly augmented by the growing modern computing technologies. expert advancements have also impacted greatly on the value of the skills of workers. Old workers usually find it very difficult to adapt to new and complex technologies, while young workers rapidly and readily acquire and employ skills that are tailored towards new te chnologies. As a result, such technologies increase the value of young workers, while they reduce the productivity of the old workers (Edward 53-65).Needless to say that computer technology has transformed the face of the world today (Edward 66). Computers are capable of storing, processing, managing and organizing large quantities of entropy and data. They have also given birth to the software industry, which is one of the most developed industries in the world. Internet technology seeded from the concepts of computer networking and has grown to be the most effective platform of communication in the world, with the largest information base that exists in the modern world. The internet infrastructure, through the worldwide web has made it affirmable for people to communicate through email, websites, downloads, media and file sharing, so transforming the world into a global village. The internet infrastructure has also made it possible for researchers, scholars and other people to share information across the globe almost instantly. The internet has also given rise to significant positive changes in the advertising and entertainment industries. Advertisements can therefore reach out to the populations within very few seconds and consequently, this has promoted the entertainment industry which relies heavily on advertisement. Simply stated, the internet has made it possible for societies in modern times to link up and promote the sharing of information and globalization (Edward 67-70).Cellular communication has also transformed the communication industry and the big society as a whole to a very great extent. One of the earliest technological advancements in communication was the invention of the conventional telephone which was followed by the telegraph. quick phones have expanded the horizons of communication in the modern world through their capacity to allow for expedient long distance communication. They have enhanced the communication process in society because they provide different ways through which people can use to communicate to others, such as through calling and sending text messages. Therefore, important information or message can reach the receiver in a few seconds. Mobile phones also help to develop and support communication, contact and communication processes within society. In spite of all of their advantages, they can also impact negatively on society. For instance, some teenagers share pornographic information and photos by sending them using their mobile phones and this has created a very serious concern. In general, inappropriate use of the internet and mobile phones for purposes such as pornography has really polluted the social culture of the modern world (Fox 89-92).Most of the modern technological processes lead to the production of excessive waste products commonly referred to as industrial waste, and pollution. These wastes can be classified as either toxic wastes, electronic wastes or radioactive wastes. regular(a) though some of the produced material waste is recycled and used in other industrial processes, much of it is released to the environment and the result is environmental pollution, degradation and lack of sustainability. rattling few technologies in the modern world are designed with the contemplation of the environment in mind. Most of the technological advancements are directed towards economic puddle rather than on environmental sustainability and this has caused a lot of direct detrimental effect on the environment, such as the depreciation of the ozone layer which has led to global warming. Historically, many societies sought to maintain their environments since they were the sources of wealth for the people. However, in the contemporary world, societies have failed to maintain and manage their environments and this has greatly affected the whole universe. The more delicate and self-explanatory impacts of technology on the environment include the exhaustion of the worlds non-renewable natural resources such as coal, ores and petroleum, and the pollution of water, air and land mostly by industrial wastes and disposal. effects of these impacts include global warming, loss of coastal wetlands, destruction of natural habitats and deforestation. While organisms are capable of recycling the wastes of other organisms naturally, there is no such mechanics of recycling for technological wastes and therefore they remain harmful to the environment for long periods of time (Fox 98-102).In conclusion, the aforementioned are only but a few fields that can be influenced by technology. It is indeed not possible to enlist all the effects (both positive and negative) of technology on society. Even though technology is in overall beneficial to world societies, it is relatively clear that technological advancement may be accompanied by negative typeface effects and drawbacks. In fact, every new technology is accompanied by unwanted or unexpected side effects. Therefore, it is necessary for societies to adapt to technological advancements that have minimal side effects on them, the environment and future generations.Works CitedBasalla, George. The Evolution of Technology. New York Longman Publishing Group, 1988. Edward, McClellan. Science and Technology in World History. majuscule John Hopkins University Press, 2006.Fox, Frank. Women, Gender and Technology. Illinois University of Illinois Press, 2006.Jenkins, Reyes. Foundations of Sociology. London Palgrave MacMillan, 2002.
Monday, June 3, 2019
Mentor Impact on Student Nurse Experience
Mentor Impact on Student Nurse ExperienceExplore the touch on of the mentor on the learning experience of the scholar throwThe current study reports the findings of a systematic literature review of search regarding the mentorship of disciple nurses. Mentorship was evaluated in terms of its development, implementation, outcomes and panopticr effects and the identified research was presented and critically analysed with reference to each of these areas.It was found that although mentorship was based on policy and standards, the mentor manipulation and mentorship relationship lighten remain unclear and requires further clarification. A need was as well identified for the supervision and monitoring of some(prenominal) mentors and student nurses to be expanded with mentors being more(prenominal)(prenominal) available and the whole process being more regularly audited.Mentorship was found to in engineerly enhance skill development through support, socialisation and the provis ion of opportunities to form clinical experience. By creating appositive learning environment and mentorship relationship the mentor throw out maximise the probability that their student nurses ordain acquire the skills necessary to be an effectual nurse.The effect of mentorship on patient tuition was identified as a complex issue with it being difficult to make confident conclusions regarding the sizing of any effect. It does appear that mentors cornerst champion indirectly improve patient care by enhancing nursing skills in their students. Finally, the mentor merchant ship play a power in creating the learning environment and mentorship relationship which rat help to realize that the student nurses have a positive learning experience.The limitations which are associated with the methodo analytical analysis which was assiduous inside this research are discussed along with the implications of the findings of this research for practice and future research projects in this field. It is concluded that mentorship has the potential to have a number of benefits for student nurses but that further research and improvements are necessary in each of the paygrade areas much(prenominal) that the effectiveness and feasibility of student nurse education can be maximised along with the quality of the care which is subsequently provided to patients.2.0 IntroductionThe world of nursing has gone through a percentage point of substantial change oer the last ten years. In the acute nursing environment, nurses arousing increasingly more complex health care interpellations and have to incorporate the delectation of advances in both medical technology and disease fencement. Within primary care, nurses are required to face the burden of chronic disease and to facilitate patients beginning to self-manage their own health. Such changes have been do as a result of Governmental policy and strategic come ones. For example, a Governmental economic review conducted by W inless (2002 and 2004)advocated changes to how go are organised and delivered.Such changes have resulted in thither being a range of extra demands being mystifyd upon the nurse, both during and after their homework. The empurpled College of Nursing (2004a and 2004b) acknowledged the change which is occurring and give tongue to that nurse education needs to be assessed and adapted to get wind the changing character of the nurse. Nurses are now required to undertake tasks which were traditionally performed by doctors. These developments have ensured that the issue of the effectiveness of a nurses development is of up most importance. by dint of these changes the need for effective mentorship in spite of appearance nursing has become ever more salient. As a result of the potential effects which mentor/student nurse relationship can have on the students learning, their experience of training, their subsequent performance on the training course, their future effectiveness as a nu rse and in conclusion on the quality of the care which is provided by the nurses, it is an outstanding topic to exact deep down the field of adult nursing. Thus the mentor/student nurse relationship needs to be evaluated.People have been interested in relationships throughout history. As far back as the ancient times, Aristotle and Cicero were commenting and theorising about relationships (Poulakis 1997). In more recent years, novelists, play-writes, biographers and clinicians have all been interested in the study of relationships in terms of why they matter, how they work and how one can improve their effectiveness and efficacy(Wood and hedge 1995).However, it has only been in the last 50 years that police detectives have started to empirically investigate inter-relationships amidst people. Such work has been undertaken from wide variety of perspectives including anthropology, child development, cognitive science, communication, social psychology, sociology, psychiatry and p sychotherapy to mention just a few (Hinde1997). The focus of such researchers has started to delivery the issues regarding relationships between staff within the health care diligence.This systematic review impart focus on addressing the relationship between a mentor and a student nurse. Whenever one is take careing these of a given intercession within a health care setting, any conclusions must be based upon the scientific research which has investigated its effectiveness and efficacy via methodologically sound techniques. every such abstract testament need to consider four key aspects, each of these exit be the focus of this systematic review.The first key component of evaluation concerns the development of the intervention. thus this review will consider research which has assessed the theoretical and conceptual foundation of mentorship within nursing. This section will include a discussion of whether the mentoring of student nurses is based on policy or a set of stand ards.The second area of focus for this review relates to the implementation of the intervention. Clearly whenever one is analysing the effectiveness and efficacy of an intervention, one must consider the way in which the intervention is operationalized and implemented as this will be likely to significantly attain the ultimate success of the intervention. This section will address the way in which mentorship is employed for student nurses and whether or non able measures have been put into place to ensure that the benefits of mentorship are maximised and that any potential drawbacks are minimised. The extent to which this mentoring is adequately supervised, monitored and audited will be assessed and critically analysed.The third key aspect of any evaluation process concerns the outcome of an intervention. Clearly an intervention can be assessed with regards to a wide range of outcomes such as economic factors, staff perceptions and customer perceptions. With regards to mentorship , it is consequential that it is evaluated in terms of the perceptions of the mentors, the student nurses and the patients such that a comprehensive evaluation of its outcomes can be achieved. As well as the perceptions of those tangled, this section will address whether or non mentorship improves nursing skills and hence whether it helps to improve the care which is received by patients.The fourth and final area of evaluation which will be turn to by this systematic review concerns the wider impact of the intervention. As well as focussing on the direct effects of a strategy, it is in like manner weighty to consider the effect which the intervention has on other relevant issues. In terms of mentorship in nursing, this will relate tissues such as whether or non a rewarding learning experience is related to the quality of the relationship that a student nurse has with their mentor. Although the focus of mentorship may be on improving the student nurses skills, it is important to critically evaluate the effect which mentorship has on the student nurses experiences of their training programme as this could influence their subsequent career choices.The pursuance review will first provide some background information regarding the topic of mentorship and student nurses. The methodology which was employed within this systematic review will then be outlined. The findings of the systematic review will then be critically analysed in terms of the key evaluation aspects of development, implementation, outcomes and wider impacts The main findings of this research will then be summarised before the limitations which are associated with this research project are outlined and discussed. Finally the implications of the findings of this research will be considered along with the areas which should be the focus of future research projects within the field of mentorship and student nurses.3.0 BackgroundA significant amount of research has Been conducted regarding adult l earning and mentorship within nursing (Bernard 1990). The teaching of student nurses has undergone significant changes in the past 20 years. These changes have especially taken place as a result of Project 2000which changed the education of pre-registration nurses (United state Central Council for Nursing, tocology and health Visiting 1986). The previous diploma level system was replaced by the Common Foundation Programme which is comprised of the four branches of Adult, Child, Learning Disability and kind Health.Through this process, registered nurses took responsibility for the learning of student nurses. The role of the nurse is adapting to incorporate these responsibilities with the Royal College of Nursing (2004a and 2004b) calling for a particular focus upon Quality, Flexibility and Diversity. Much has been create verbally about the practitioner as facilitator, supervisor, assessor and role model, and the overlay of role functions (Bailey 1992, Clarke et al1986, Heron 197 7, Mason 1987, Myrick and Wane 1988, Windsor 1987.Despite this, there is smooth a lack of consensus within the literature in terms of a clear definition of what is meant by the term mentor(Hearty 1986, Morel 1990 and Phillips et al 1996).It has been argued that the task of defining the term mentor is made more complicated byte fact that other terms are use, such as assessor, facilitator and supervisor, to describe the same role (Phillips et al 1996). As result of the wide range of aspects of the role which is played by mentor, it can be stated that a definition of mentor can only be general definition as anything more specific would run the risk of excluding important elements of the position (Davies et al 1994). Forth purposes of the following review, the definition of mentor which was provided by Woolskin (1982) will be adoptedMentorship is a relationship which is aimed at guiding the novice towards an established place within the profession (Woolskin 1982)In the nursing profess ion the aims of the mentor will be to form relationship with their student nurses which helps the student to be successful in their training programme and to go on to be effective nurses in the future. Jarvis (1995) emphasised that it is important to focus on the mentors role as a function and as a relationship with the student nurse rather than being about them as a teacher or practitioner.Through this role the mentor can help to narrow the gap between theory and practice (Arbitrage and Bernard 1991). Indeed some have argued that mentor is in fact the wrong term to use within the health care industry as it is not equivalent to other industries in which the term mentor is used (Donovan 1990).However one conceptualises mentorship, the benefit of having a good mentor has been describe by student nurses within previous research. Ina longitudinal study, Gary and Smith (2000) interviewed 10 student nurses at five different points throughout their three year training programme. The parti cipants also kept a diary as part of the research. It was account that the students noted the importance of having mentor which represented a good role model.They also thought that it was important to recognise the likes and dislikes of the mentor as this had the potential to significantly impact on their assessment outcomes. The role of the mentor was found to be particularly beneficial at the beginning of the training process. As the training progresses the students felt that they grew in confidence as they became more competent. This ensured that they were more independent and that they placed a reduced demand on their mentor. Although their continued support was said to help the students finish the course and to choose longer term career in nursing.Therefore it does appear that through effective mentorship, the chances that a student nurse roll in the hays their training programme can be increased. seek has investigated the reasons why student nurses fail their training progr ammes. Two key areas of reasons have been identified. The first relates to the student nurses inability to cope with the demands and standards required by the course (Ehrenfeld et al1997 and Fulbrook et al 2000).It could be that a mentor can help to provide support and guidance for the student nurse to improve the chances that they can meet the requirements which are placed upon them and hence complete the training course successfully. The second key area of reasons for failure are those relating to personal factors(MORI 2003 and Royal College of Nursing 2001). This includes a range of possible factors such as financial, health or a change in circumstances. The mentor could also play a role here to help the student nurse manage their problems and to cope with them more effectively. The methodology which was employed within this research will now be outlined.4.0 MethodA systematic review aims to integrate existent information from comprehensive range of sources, utilising a scientifi c replicable approach, which gives a balanced view, hence minimising bias (Clarke Oman 2001, Hart 1998, Muldrow 1994, Oman and Goat 1993). Another speech communication, a scientific approach will help to ensure that research evidence is either include or excluded based upon well- delimitate and standardised criteria. This should ensure that the possible effects of researcher bias should be kept to a minimum. Berkley and Glenn (1999)also states that systematic reviews provide a means of integrating valid information from the research literature to provide a basis for rational decision making concerning the provision of healthcare.4.1 Reviewing ProcessWhenever one reviews or compares research reports, it is important that clear set of criteria are established upon which the evaluations can be made. Table 1 below outlines the global process which was used to conduct the literature review. This process was based upon that employed by Berkley and Glenn (1999). Each selected denominatio n was reviewed with reference to a number of different issues using a Table which was also based on Berkley and Glenn (1999). This review table is displayed in Appendix 1. at a time obtained each article will be filed and stored entrancely. A computer-based list will be maintained of the articles which had been reviewed.Table 2Core Principles Used in Reviewing Selected Research Articles (adapted from McInnis 2004)Systematic reviewsAdequate search strategyInclusion criteria clutchQuality assessment of included studies undertakenCharacteristics and results of included studies appropriately summarizedMethods for ponding infoSources of heterogeneity exploredRandomised controlled trials adopt blinded, if possibleMethod used to generate randomisation schedule adequateAllocation to treatment groups concealedAll randomised participants included in the analysis (intention to treat)Withdrawal/dropout reasons given for each groupCohortAll eligible subjects (free of disease/outcome of inte rested) selected or random audition80% agreed to enrollSubjects free of outcomes on interest at study inceptionIf groups used comparable at baselinePotential confounders controlled forMeasurement of outcomes unbiased (blinded to group)Follow-up sufficient durationFollow-up complete and exclusions accounted for ( 80% included in final analysis)Case controlEligible subjects diagnosed as cases over a defined period of time or defined catchment area or a random sample of such casesCase and control definitions adequate and validatedControls selected from same creation as casesControls representative (individually matched)80% agreed to participateExposure status ascertained objectivelyPotential confounders controlled forMeasurement of exposure unbiased (blinded to group)Groups comparable with think of to potential confoundersOutcome status ascertained objectively80% selected subjects included in analysisCross-sectional/surveySelected subjects are representative (all eligible or a rand om sample)80% Subjects agreed to participateExposure/outcome status ascertained standardized wayQualitativeAuthors position clearly statedCriteria for selecting sample clearly describedMethods of data collection adequately describedAnalysis method used rigorous (i.e., conceptualised in terms of themes/typologies rather than undetermined collection of descriptive material)Respondent validation (feedback of data/researchers interpretation to participants)Claims made for generalizability of data Interpretations supported by data4.2 Sources of DataThe methodology employed within the research will involve obtaining data from three key sources Computerised searches, Manual searches, and the Internet. Each of these data sources will now be considered in more detail.4.2.1 Computerised SearchesThe methods used in this research will include a detailed computerised literature search. Multiple databases, both online and CDRom will be accessed to retrieve literature because they cite the majori ty of relevant texts. (Loy 2000 Ford 1999) The computerised bibliographic databases are- MEDLINE EMBASE CINAHL PSYCHINFO British Nursing Info BNI Cochrane Science Direct (All Sciences Electronic Journals) Asia DETOC HMICHowever because articles may not be correctly indexed within the computerised databases, other strategies will be applied in order to achieve a comprehensive search (Sindh Dickson 1997).4.2.2 Manual SearchesA manual search will be performed to ensure that all relevant literature is accessed. The manual searches will include- Books relevant to the topics from university libraries and web sites Inverse searching- by locating index terms of relevant journal articles and texts Systematically searching reference lists and bibliographies of relevant journal articles and texts4.2.3 The InternetThe internet will provide a global perspective of the research topic and a searchable database of Internet files collected by a computer. Sites accessed will include- Department of H ealth National name of Clinical Excellence English National Board of Nursing, Midwifery and Health Visiting Google4.3 Identification of Key WordsThe selection of key words is an important task as it will have significant impact on the articles which are identified in the search. One must choose appropriate words which maximise the chance that the most appropriate research evidence can be found. Databases use controlled vocabulary of key words, in each citation. To assist direct retrieval of citations techniques Boolean logic will be applied using subject indexing, field searching and truncation to narrow the topic focus (Loy 2000, Hicks 1996, Goodman 1993). As part of this approach, key words will be based on the components of the review question.An imaginative and resourceful technique of searching electronic databases will be used including recognising the inherent faults in the indexing of articles. Misclassification and misspelling will be included in the searches with searches utilising keywords and the subheadings, (Hicks 1996). Based on these principles, the following search terms will be used in different combinations Mentorship Mentor Student Nurses Training EvaluationFurther search terms may be used within the methodology if they are identified within some of the initial search items. Whenever one is searching literature sensitivity and specificity are important issues when conducting searches of research on a database. The searches need to be as sensitive as is possible to ensure that as numerous of the relevant articles are located.This may be a particularly salient issue with regards to the evaluation of mentorship in student nursing as the number of appropriate entries may be limited. Thus an attempt to locates many of these articles as possible becomes a more relevant and important objective. Furthermore, the search needs to be specific Another words, it needs to be efficient where appropriate so that higher number of the articles identified t hrough a database search can be included and hence the time allocated to reviewing articles which are ultimately of no relevance, can be kept at an acceptable level.4.4 Inclusion and Exclusion CriteriaIn order that a manageable quantity of pertinent literature is included in this study, it is substantial that inclusion and exclusion criteria are applied. In order that a diverse perspective of the topic is examined broad criteria will be used. (Benignant 1997). However, it is important to note that a balance needs to be achieved through which the scope of the inclusion criteria is sufficiently wide to include relevant articles whilst also being sufficiently specific such that the retrieval of an unmanageable set of articles is avoided.4.4.1 Inclusion CriteriaThe articles which are highlighted within the proposed searches will be assessed in terms of whether or not they meet the following criteria. Each article will need to be viewed as appropriate with regards to all of these constr aints if they are to be included in the final analysis.From the pool of data which is obtained, the most appropriate articles which meet these inclusion criteria will be selected for use within the review. A literature review encompassing all methodologies will be applied ( Pettigrew 2003) International studies will be included Available in English mend to the evaluation of mentorship within health care Relate to the training of student nurses Centre on the elderly population4.4.2 Exclusion CriteriaThe articles highlighted by the searches will also be assessed in terms of whether or not they fulfil the following exclusion criteria. If a potential relevant article meets one or more of these criteria then they will be immediately excluded from the data set and will not be included within the analysis stage of the methodology. Articles relating to mentorship in industries other than health care will not be included Literature in a foreign language will be excluded because of the cost and difficulties in obtaining translation. Research reported prior to 1985 will not be included within this review.4.5 Consideration of Ethical IssuesAny research involving NHS patients/service users, carers, NHS data, organs or tissues, NHS staff, or premises requires the approval of ankhs research moral philosophy committee (Department of Health 2001) A literature review involves commenting on the work of others, work that is primarily published or in the public domain. This research methodology does not require access to confidential case records, staff, patients or clients so permission from an ethics committee is not required to carry out the review. However, it is essential to ensure that all direct quotes are correctly referenced.Permission must be sought from the correspondent before any personal communication may be used. All copyrights need to be acknowledged and referenced. The researcher will also act professionally when completing this report and ensure that research i s identified, reviewed and reported accurately and on scientific basis. The following set of chapters will now outline the research which has addressed the different aspects of the debate regarding mentorship and student nurse education.The following analysis will be conducted regarding the four different aspects of evaluation. As outlined by Kirkpatrick (1979) it is important to address each stage of any training intervention when conducting an analysis. Therefore, the development, implementation, outcomes and wider impacts of mentorship in student nurse education will all be considered. The most appropriate research regarding each of these four aspects will be critically analysed and compared to other relevant research findings.5.0 Evaluation of The Development of Mentorship ProgrammesWhenever one is evaluating a health related intervention, it is important to first consider the policies, standards and theoretical perspectives which underpin the approach. In terms of mentorship, o ne must address the questions regarding the framework and structure which they are real in conjunction with and to determine whether or not the approach was developed in an appropriate way. The policies and structures which underpin pre-registration nurses education has undergone significant changes in the last twenty years.This was particularly as a result of the introduction of Project 2000 (United Kingdom Central Council for Nursing, Midwifery and Health Visiting1986). The transformation was centred around the introduction of a Common Foundation Programme which was comprised of four different branches Adult nursing, Child nursing, Mental Health nursing and the nursing of people with learning disabilities. This replaced the previously used diploma level education system. Through these policies, a set of standards were established for the conceptualization of people who are going to teach nursing, midwives and specialist public health workers.A booklet which outlines these standa rds was produced by the United Kingdom Central Council for Nursing, Midwifery and Health Visiting (2004). This also sets out the guidelines for the qualifications which are recommended and required for these teachers. The English National Board has suggested that mentorship should be key part of the Project 2000 courses (An forth 1992). It is also suggested that there should be a policy to emphasise five key aspects of the role of a mentor in their relationship with their student nurse. These are Assisting, Befriending, Guiding, Advising and Counselling(An forth 1992). They also argue that the role should not include supervising, assessing or facilitating.The following discussion within this section will now move on to consider the mentorship role which has been derived based on these relevant policies and standards. The extent to which this derivation was appropriate and how the mentorship role is subsequently perceived will be outlined and critically analysed. This evaluation will now be conducted from the perspectives of theorists/researchers in this field, the student nurses and the mentors involved.In broad terms, these policies and standards appear to be appropriate in terms of providing a framework to govern mentorship within student nursing. However, one needs to look past the theoretical perspective and address the practical aspect of the development of mentorship. The extent to which these policies and standards are adequate when viewed during their exercise merits consideration. Researchers and theorists in this field have argued that despite these policies and standards, the role of mentor remains unclear as there are a number of models and frameworks which exist and which can be applied (Andrews and Wallis 1999).Furthermore, Andrews and Wallis (1999) also go on to suggest that many mentors attend short, local training courses which are not standardised. Although they may adhere to the appropriate standards, there still remains sufficient scope fo r mentors to receive different types and levels of training when becoming mentors of student nurses. Also, as a result of the continued use of the terms mentor, supervisor and assessor to describe interchangeable roles, it is argued that this continues to contribute to the confusion within this field(Wilson-Barnett et al 1995). The policies and standards require a more specific focus such that more standardised definitions, roles and training programmes can be established and agreed by all of the key stakeholders in this debate. One of the more obvious stakeholders to consider are the student nurses themselves.The extent to which the mentorship of student nurses is appropriately grounded in policy and standards needs to also be assessed from the student nurses perspective. It needs to be seen to have logical foundations such that the students can have confidence in the system and that they can understand the purpose and objectives of the relevant policies and standards. One study w hich has addressed this topic was conducted by Watson (1999). A sample of 35 student nurses were interviewed using a semi-structured approach.The student nurses reported to key findings. Firstly they reported that the mentorship process was not sufficiently defined by the English National Board. They stated that although there were standards in place, they did not result in there being a clear understanding of what the role and purpose of a mentor actually was designed to be.The second key finding was that the student nurses perceived that the mentorship process was not clarified within their interior(a) organisation. Irrespective of the over-riding standards outlined by the English National Board, the internal organisation could have put into place a clear structure and understanding of mentorship to ensure that its role was understood byte student nurses. Therefore, from the student nurses perspective, the presence of the appropriate policies and standards was not accompanied by an appropriate application and implementation of such guidelines. Having said this, the sample used in this study was relatively small and so the extent to which the findings can be generalised to the UK as a whole is questionable. Other similar explorative research has been conducted which has focused on the perspectives of the mentorsThe introduction of Project 2000 has placed a responsibility on many registered nurses to mentor student nurses. Although the relevant standards provided by the English National Board do address this area, again they do not appear to be standardised across the country. For example, Cahill (1996) found that there were a range of mentor selection procedures as well as a range of preparation and function definitions. Further research was conducted by Near (1997 and 2000).It involved collecting data from 155 mentors.They reported that these of the terms mentor, assessor and supervisor did result in them being confused over their role as a mentor. They wer e also unclear regarding their relationship with their student in terms of the nature which it should take and the extent to which they were supposed to help them. This in turn was said to adept to difficulties with regards to competency assessment as they were not sure what was expected of them and their students.Therefore, this section has demonstrated that policies and standards regarding mentorship have been provided by the English National Boards part of Project 2000. However, questions still remain regarding the extent to which these policies and standards have
Sunday, June 2, 2019
Alcohol :: essays research papers fc
It has been readd in each research source that hazing and particularly debauch drinking is the most serious problem touching social life, academic life, and health on college campuses today. The journal member pertaining to this issue, How Harvards College Alcohol Study Can Help Your Campus Design a Campaign Against pupil Alcohol Abuse (CAS Campus Alcohol Study for short), focuses more heavily on bacchanalia drinking and prevention than it does on the Greek system itself. The authors, Wechsler, Nelson, and Weitzman, contend that binge drinking is a nationally recognized problem but has not been studied efficiently enough to warrant effective prevention plans. The purpose of this article is to share with the public the results of a survey representing 50,000 school-age childs in 140 colleges, in 39 states. This is the first nationally representative survey of its kind and the analysis of its sequel by the authors of this article has resulted in seemingly sound prevention ideas. To begin interpreting the binge drinking phenomenon, a solid understanding of the term moldiness be presented. Binge drinking is defined by all the articles as consuming volt or more drinks in rapid succession (four or more for women) at least once in a two week period. Shockingly, the College Alcohol Study (CAS) found that two aside of every five college students binge drink. The authors of this article argue that binge drinking has negative effects not only on the drinkers, but also on the entire student body. The binge drinker might get alcohol poisoning, other related physical injuries, or weakened academic performance, while the non-binging students are subjected to insults, arguments, vandalism, physical and versed assaults, and loss of sleep due to alcohol influenced peers. The next topic that the article gets into is the different areas that change need be made to lessen the presence of binge drinking and ways in which these changes might be made. The first idea presente d is that simply educating students about alcohol abuse and related problems is not effective. The CAS shows that four out of five students have been exposed to anti-alcohol information and still two out of these five binge drink, let alone drink at all. In fact, Wechsler, Nelosn, and Weitzman state that most members of predominant binge drinking groups like athletes and Greek organizations openly admit to being educated in this area. These findings display how ineffective alcohol education on college campuses is.
Saturday, June 1, 2019
Themes Of Unity In The Grapes Essays -- essays research papers
John Steinbecks novel, The Grapes of Wrath, is a moving account of the social plight of Dustbowl farmers and is widely considered an American classic. The novel takes place during the depression of the 1930s in Oklahoma and all points west to California. Steinbeck uses the Joad family as a specific example of the general plight of the woeful farmers. The Joads are forced off of their farm in Oklahoma by the banks and drought, and they, like many opposite families of the time, head out for the promised land of California. They endure more hardship along the way, and they finally make it to California only to find that work is scarce and human labor and life are cheap. Tom Joad, the first son in the family, starts the book freshly out of jail and slowly evolves from selfish goals to a sense of an ideal worldly purpose in labor union quite a little against injustice. Jim Casy, an errant preacher who is accepted into the Joad family early into the story, changes his beliefs to in clude all people in a sort of oversoul, as he helps to organize the workers to interlocking the extreme injustice d maven onto them by the farm owners and discriminating locals. Whereas the Joads start out as one family, by the end of the story their family becomes one with other families who are weathering the same plight of starvation and senseless violence. In The Grapes of Wrath, Steinbeck emphasizes the power of groups over the individuals power to survive poverty and violence through character evolution, temporary hookup and the use of figurative and philosophical language. Tom Joad begins the novel with self-seeking aims, precisely with the ex-preacher Jim Casy as a mentor, he evolves into an idealistic group leader. Tom first meets Jim on his way home from jail. There begins a lasting friendship with the verbose preacher, who is going through a belief makeover and steadily moving toward the Emersonian oversoul including all people in a general spirit of human love and kin ship. Tom is steadily angered more and more with his familys plight, but even into the beginning of the familys journey, he still has individualistic thoughts that consume his ideas. When Jim is trying to get Tom to think of the big picture, to get a worldly view of the effects of the hundreds of thousands of people moving west, Tom says, Im still laying my dogs down one at a time, and I climb fences when I got fe... ...e way for the concern of the people (Bowden 196). And most critics agree that the sense of common unit grows steadily through Steinbecks narrative (Lisca 97). In the chapters that explain the general situation of life in California, Steinbeck figuratively and philosophically explains the evolution of unity and equality. The Grapes of Wrath all the way demonstrates the theme that when overcoming hardship the whole is greater than the sum of its parts. At the end of the story Ma Joad has come to understand that her family is just part of another larger family of th e migrant poor. Tom Joad comes full circle from individualistic aims to embracing the group and organization of the masses. The main events in the Joads life at the government camp and the eruption at the peach orchards also emphasize unity. At times in his narrative Steinbeck even blatantly explains his philosophies of group power and shared burden. As one critic puts it The family of man is even more than a necessity for the Joads it is an ideal of the novel (Bowden 199). Steinbeck truly succeeds in giving the reader the message that when united people stand, but divided they fall.
Subscribe to:
Posts (Atom)